Which of the following is a common Linux rootkit?
A. Back Orifice
B. Kill Trojans
C. Packet Storm Security
D. Linux Rootkit 5
Answer: D
You might also like to view...
The most popular implementation of DNS is the Unix Internet Name Domain.
Answer the following statement true (T) or false (F)
Options configured at the server level affect all scopes and cannot be overridden by a scope option.
Answer the following statement true (T) or false (F)
If EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you're a member of the Administrators group.
Answer the following statement true (T) or false (F)
One approach to troubleshooting a computer problem is to work through a process of _______________ to determine a cause.
Fill in the blank(s) with the appropriate word(s).